English Community

IntroductionCommunity Spotlight
All Forum Topics

801 Posts



11719 Signins

298099 Page Views

  • Posts: 801
  • Registered: ‎08-03-2011
  • Location: GB
  • Views: 298099
  • Message 1 of 3

In the Spotlight - Lenovo Forum's first event on Malware and Security

2011-12-07, 1:42 AM


This series of write-ups celebrates the Lenovo Forum's family of volunteer advocates - moderators, gurus and outstanding members of the Forum, who consistently go out of their way to help out in this community through sharing what they know, dissecting, delving and diving into various issues to educate other users and solve one another's problems. We salute and honor your dedication and hard work!

 “As a tech enthusiast and student currently learning about IT security, I was really glad to see the recent malware and security special event held in the Lenovo Forums. I had the opportunity to ask and learn from security experts who work at top tier AV / Security companies, professionals involved in supporting others in battling malware, and from other community members.  I learned a lot and even got a few things cleared up that weren’t addressed in my classes,” says community member PeterTWJ, in a message posted during our Security and Malware special event Nov 28-30. 

The event’s panel of experts featured members from leading AV companies like Symantec, security firm Trend Micro, anti-spyware website SpywareHammer, and several Microsoft MVPs who work in the security field.  The group fielded questions about system bugs and all things nasty, discussed common and emerging security threats.


Given the broad range of industry experience and perspectives represented by the panel, it was interesting to explore the contrasts in view.  Pieter Viljoen, a Senior Technical Director at Symantec, agreed that, “…running two real-time protection products at the same time is a recipe for trouble”, while offering contrasting views on the direction of cloud based scanning.


A sign of the times,  malware concerns on mobile devices surfaced as a hot discussion topic and  Aryeh Goretsky, a Microsoft MVP, was first to weigh in on the issue… “as more people use smartphones for payment services, I would expect criminals to look for vulnerabilities in those processes and find ways to exploit them for financial gain as well.”  Microsoft MVP Corrine Chorney, who also specializes in Consumer Security, also shared an article she wrote in her blog on Tablet Security and reminded users to ‘only use your clean, secure home computer for online banking, shopping or other financial transactions.” Trend Micro’s Rose Gabillette likewise contributed an articlefrom Trend Labs, noting that smartphones are the next target of one-click billing fraud.


Another hot topic that saw both collaboration and corroboration amongst the panelists was a question raised about the safety of programs that clean a user’s systems. Linda Layton, another Microsoft MVP, shared a checklist for users who wish to use such services, and offered a cautionary tale when using registry cleaners.   Likewise, co-founder and administrator of SpywareHammer Allen Weil chipped in and reminded users that “as a general rule, users should never try to edit their registry except under the personal direction of an acknowledged expert.  It is horrendously complex, and interconnected.  One significant misstep and you may be forced to reinstall your entire system.” Dave Kliros, another Microsoft MVP, reflected on the topic of exploits, saying “there are programs written with the intention to defraud. Some of these have bundled with them, a rootkit which allows its designer to take control of your system… (and that) there are very real possibilities of downloading and installing malicious software under any name, much less disk or registry cleaning programs...or antivirus programs”.


Rounding up the discussion, Trend Micro’s Cyrus Ramos provided an interesting compilation of many tricks hackers use to break into accounts.


At the end of it all, what users have to remember, says co-owner and administrator of SpywareHammer Jim Stables, is “there are going to be times when a PC cannot be rescued from infection no matter what you do. However malware writers gain nothing by destroying a PC. They infect the PC to either use to their advantage (bot nets), to hold your PC hostage and demand a monetary ransom, or to steal your personal information. So they will leave the PC usable. By doing so they leave the user the opportunity to rescue the PC.”

So beef up your knowledge today – the event may be over but the knowledge shared can still be accessed in the community knowledge base here.

I’ll close with a big SHOUT OUT to our panelists who helped make this event a success. THANK YOU!


Special thanks to:



Please remember to come back and mark the post that you feel answered your question as the solution. Did you find a post helpful? You can thank the member by awarding them a Thumbs Up! Please don't ask me questions by Personal Message; questions belong in the forums.
Using Browser Search to find your answers in Lenovo and Moto Community

2036 Posts



12480 Signins

144578 Page Views

  • Posts: 2036
  • Registered: ‎05-01-2010
  • Location: US
  • Views: 144578
  • Message 2 of 3

Re: In the Spotlight - Lenovo Forum's first event on Malware and Security

2011-12-07, 14:49 PM

It was fun sharing and learning. Lenovo did a great job on the event!

Microsoft MVP Consumer Security 2006-2016 / Windows Insider MVP 2016-Present
I am not employed by Microsoft or Lenovo.

Deutsche Community Comunidad en Español English Community Русскоязычное Сообщество Communidade Portugues

Using Browser Search to Find Your Answers In Lenovo and Moto Community

6 Posts



54 Signins

320 Page Views

  • Posts: 6
  • Registered: ‎12-09-2011
  • Location: Canada
  • Views: 320
  • Message 3 of 3

Re: In the Spotlight - Lenovo Forum's first event on Malware and Security

2011-12-10, 0:22 AM


Forum Home

Community Guidelines

Please review our Guidelines before posting.

Learn More

Check out current deals!

Go Shop